2020
DOI: 10.1007/978-3-030-56880-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Lattice-Based Blind Signatures, Revisited

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(8 citation statements)
references
References 57 publications
0
8
0
Order By: Relevance
“…A kind of signature that requires interaction is blind signature, where a user wants to obtain a signature by a signer on some message m, without the signer obtaining any information about the message m. Currently, in the setting of lattice-based blind signatures, the tree of commitments technique introduced in [4] to reduce the abort probability has been successfully used a couple of times, first in the same paper [4] as an improvement of the signature scheme BLAZE [3] and then in [16] to construct a provably-secure (in contrast to BLAZE and BLAZE+) but inefficient scheme which involves three rounds of communication.…”
Section: Settings Where Our Results Is Not Usefulmentioning
confidence: 99%
“…A kind of signature that requires interaction is blind signature, where a user wants to obtain a signature by a signer on some message m, without the signer obtaining any information about the message m. Currently, in the setting of lattice-based blind signatures, the tree of commitments technique introduced in [4] to reduce the abort probability has been successfully used a couple of times, first in the same paper [4] as an improvement of the signature scheme BLAZE [3] and then in [16] to construct a provably-secure (in contrast to BLAZE and BLAZE+) but inefficient scheme which involves three rounds of communication.…”
Section: Settings Where Our Results Is Not Usefulmentioning
confidence: 99%
“…This problem motivated Kaim, Canard, Roux-Langlois, and Traoré [42] to distribute the role of EA by using the threshold blind signature scheme from [7]. However, that scheme [7] was shown to be flawed [36].…”
Section: Basic Versionmentioning
confidence: 99%
“…A lot of research work has been done to reduce the computational overhead and energy consumption of asymmetric cryptosystems and to propose a more secure and reasonable key management scheme. A review of smart grid-related security issues can be found in [30][31][32][33][34], among others, for smart grid key management schemes. Using the solid security foundation over lattice and higher computational efficiency, this paper proposes a lattice-based smart grid key management scheme to ensure the security of communication phase by constructing intra and inter-cluster multi-hop routing security algorithms; introducing timestamp parameters and identity-based information to ensure the security of key update phase; using symmetric cryptosystem algorithms for encryption to improve communication efficiency; and using probabilistic output authentication information that makes the distribution of the output authentication information independent of the private key of the authenticated subject.…”
Section: Introductionmentioning
confidence: 99%